[go: up one dir, main page]

Thumar et al., 2016 - Google Patents

A Framework for Secure Data Storage in Mobile Cloud Computing

Thumar et al., 2016

Document ID
14652757960889612979
Author
Thumar V
Vekariya V
Publication year
Publication venue
Proceedings of International Conference on ICT for Sustainable Development: ICT4SD 2015 Volume 2

External Links

Snippet

In mobile cloud computing, data storage and its processing is done externally from the mobile devices. The mobile user can access the applications or data from cloud servers (Dinh et al., Wireless Commun. Mobile Comput. 13 (8), 1587–1611). The client can store …
Continue reading at link.springer.com (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6218Protecting access to data via a platform, e.g. using keys or access control rules to a system of files or objects, e.g. local or distributed file system or database
    • G06F21/6245Protecting personal data, e.g. for financial or medical purposes
    • G06F21/6263Protecting personal data, e.g. for financial or medical purposes during internet communication, e.g. revealing personal data from cookies
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/62Protecting access to data via a platform, e.g. using keys or access control rules
    • G06F21/6209Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/70Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer
    • G06F21/71Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information
    • G06F21/77Protecting specific internal or peripheral components, in which the protection of a component leads to protection of the entire computer to assure secure computing or processing of information in smart cards
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2111Location-sensitive, e.g. geographical location, GPS
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2107File encryption
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/602Providing cryptographic facilities or services
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2141Access rights, e.g. capability lists, access control lists, access tables, access matrices
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2105Dual mode as a secondary aspect

Similar Documents

Publication Publication Date Title
US20140281520A1 (en) Secure cloud data sharing
US11075753B2 (en) System and method for cryptographic key fragments management
CA3066701A1 (en) Controlling access to data
Murray et al. Cloud service security & application vulnerability
Yadav et al. Mobile cloud computing issues and solution framework
Thilakanathan et al. Secure multiparty data sharing in the cloud using hardware-based TPM devices
Igarramen et al. FADETPM: Novel approach of file assured deletion based on trusted platform module
Agarkhed et al. Security and privacy for data storage service scheme in cloud computing
Indu et al. Secure file sharing mechanism and key management for mobile cloud computing environment
Suthar et al. Encryscation: An secure approach for data security using encryption and obfuscation techniques for iaas and daas services in cloud environment
Santhisri et al. Comparative study on various security algorithms in cloud computing
Purushothama et al. Secure cloud storage service and limited proxy re-encryption for enforcing access control in public cloud
Anwar Data security issues in the realm of mobile cloud computing: A survey
Mahapatra et al. Security model for preserving privacy of image in cloud
Salem et al. An efficient privacy preserving public auditing mechanism for secure cloud storage
Khan et al. A survey on preserving data confidentiality in cloud computing using different schemes
Thumar et al. A Framework for Secure Data Storage in Mobile Cloud Computing
Yasmin et al. Decentralized Entrance Power with Secret Endorsement of Data Stored in Clouds
Tukkoji Secure Data Storage in Cloud Computing Using Code Based McEliece and NTRU Cryptosystems
Mallick et al. Security aspects of social media applications
Mishra et al. Improved cloud security approach with threshold cryptography
Alam et al. Secure sharing of mobile device data using public cloud
Siopi et al. DeCStor: A Framework for Privately and Securely Sharing Files Using a Public Blockchain
Yao et al. Cloud multimedia files assured deletion based on bit stream transformation with chaos sequence
Lee et al. A study of practical proxy reencryption with a keyword search scheme considering cloud storage structure